cover
Contact Name
-
Contact Email
coscitech@umri.ac.id
Phone
+6285225539224
Journal Mail Official
coscitech@umri.ac.id
Editorial Address
Program Studi Teknik Informatika Fakultas Ilmu Komputer Gedung Rektorat Lt. 4, Universitas Muhammadiyah Riau Jl. Tuanku Tambusai, Pekanbaru, Riau
Location
Kota pekanbaru,
Riau
INDONESIA
Jurnal Computer Science and Information Technology (CoSciTech)
ISSN : 2723567X     EISSN : 27235661     DOI : https://doi.org/10.37859/coscitech
Core Subject : Science,
Jurnal CoSciTech (Computer Science and Information Technology) merupakan jurnal peer-review yang diterbitkan oleh Program Studi Teknik Informatika, Fakultas Ilmu Komputer, Univeritas Muhammadiyah Riau (UMRI) sejak April tahun 2020. Jurnal CoSciTech terdaftar pada PDII LIPI dengan Nomor ISSN 2723-5661 (Online) dan 2723-567X (Cetak). Jurnal CoSciTech berkomitmen menjadi jurnal nasional terbaik untuk publikasi hasil penelitian yang berkualitas dan menjadi rujukan bagi para peneliti. Jurnal CoSciTech menerbitkan paper secara berkala dua kali setahun yaitu pada bulan April dan Oktober. Semua publikasi di jurnal CoSciTech bersifat terbuka yang memungkinkan artikel tersedia secara bebas online tanpa berlangganan.
Articles 8 Documents
Search results for , issue "Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)" : 8 Documents clear
String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort Ilham Firdaus; Januar Al Amien; Soni Soni
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2180

Abstract

Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application.
Sistem Informasi Manajemen Arsip Surat Berbasis Desktop pada BP3TKI Jakarta Wiji Lestari; Faiz Rafdhi
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2183

Abstract

At the BP3TKI Jakarta office, there are still some problems in processing incoming and outgoing letters including frequent double numbering errors in incoming and outgoing letters, relating to storage in this case archiving is only in the form of storing hardcopy documents which results in lost letters and a lot of use of paper so spend more in terms of company operations. So it was designed a Letter Filing Management Information System in Jakarta BP3TKI. In building a Letter Filing Management Information System in BP3TKI Jakarta using Vb.Net with visual studio 2010 software as a programming language and display design. MySQL as a database. This system development uses UML (Unfied Modeling Language) tools as an analysis of the running system. The research methodology uses a waterfall, with stages of analysis, design, manufacture, coding, testing. This study produces a Letter Archive Management Information System in BP3TKI Jakarta that can facilitate the management of incoming and outgoing mail data, the process of making reports, recording letters, storing letters properly so as to facilitate the search for data. Can change a manual mail archive management into a structured system.
Rancang Bangun Aplikasi Mobile Pengenalan Huruf Jawa (Aksara Jawa) Berbasis Android Indah Puji Astuti; Ega Feri Romawati; Ida Widaningrum
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2185

Abstract

Technological developments, especially smart phones, have been widely applied in the education sector. One example is the number of mobile-based learning media. Javanese language, especially Javanese script, has begun to erode because it is very rare nowadays to learn Javanese. The many forms of writing and also terms in Javanese script sometimes make us lazy and reluctant to learn them. In this study, the authors made an application as an Android-based learning media for learning Javanese characters. The application is equipped with a voice reading character so that users can easily understand the material. In addition, the application is equipped with a quiz to review the user's ability to learn Javanese script. Android based was chosen because the smart phone owned in addition to communication media can also be used for learning media. This research uses the waterfall system method. The stages used are analysis, design, coding and testing. The results of the black box testing on this application show that the application is running well according to its function.
Implementasi Aplikasi Berbasis Teknologi IoT pada Perangkat Tracking dan Kendali Kendaraan Bermotor Ade Irma; Nasron; Martinus Mujur Rose
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2191

Abstract

The increasing use of vehicles, especially motorbikes, has the potential to increase motor vehicle theft cases. The increase in motorcycle theft cases can occur due to the weakness of the owner in installing a motorcycle security system, so that it has the potential to experience losses due to theft. An indication of the problem is how to develop an application that can be used to carry out tracking that can display the position of the vehicle with integrated maps and vehicle control remotely in the event of a vehicle theft. The development of Internet of Things (IoT) technology as well as information and communication technology can now be used to develop an application for wireless vehicle monitoring and control. So that it can make it easier for vehicle owners to track and control the vehicle to minimize vehicle loss. In this study using MIT App Inventor as an application development platform and using ThingSpeak as an IoT database server. Furthermore, the application will be integrated with the Tracking Device device consisting of a microcontroller, Global Positioning System (GPS) module, and a DC relay installed on the vehicle, utilizing an internet connection as a link between the application and the tracking device. The result is that vehicle position data can be displayed through a mobile application with map visualization integrated with google maps and the user can turn off or turn on the vehicle through the application with the farthest distance that has been successfully tested of 141 km. The time for the tracking device to respond to commands from the application varies from 5 to 20 seconds depending on the strength of the internet connection used. Keywords : Internet of Things (IoT), Tracking Device, Global Positioning System (GPS), mikrokontroler.
Sistem Informasi Kegiatan Penunjang Akademik Mahasiswa Berbasis Desktop Dewi Sahara Nasution; Faiz Rafdhi
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2192

Abstract

As science and technology have grown, the role and use of information technology has become important. In creation of the book activities on the campus of the Jakarta high school administration of information and computers that have been carried out each year, there are some problems with the data of the activities being carried out and the list of students who have followed the activities that have been carried out, so the certificates and schedule of the activities are ineffective and efficient. In constructing student information-support information system at the Jakarta high school for information management and computers muhammadiyah using Visual Basic (vb.net) as the language oh this program and mysql as database. The system development uses the waterfall model with the step-by-step analysis, design system, coding and testing, implementation and maintenance. The study produced a student’a educational information system that could facilitate the activity data input processstudents can be done quickly, accurately and efficiently. The built system may show student’s overall data, which consists of a list of activities, activity activity times, and activities that have been followed.
Analisis Tingkat Keamanan Informasi: Studi Komparasi Framework Cobit 5 Subdomain Manage Security Services (DSS05) dan NIST Sp 800 – 55 Eko Handoyo
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2199

Abstract

Information technology is a very important part of the organization. IT is expected to provide a good profit for the company. However, as technology evolves, it is often exploited by some irresponsible parties that can lead to the emergence of threats and risks from the use of technology. The organization needs to measure the level of information security to identify the system's weaknesses and threats to the organization. Standards for measuring information security are COBIT 5 subdomain manage security services (DSS05) and NIST SP 800-55 revision 1. This study is comparing the two standards. Comparative analysis uses qualitative analysis based on three aspects in information security that are confidentiality, integrity, and availability. Based on the analysis result obtained the advantages and disadvantages of each standard.
SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online Imam Farisi; Mukhaimy Gazali; Rudy Anshari
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2204

Abstract

A business institution can promote their products in its online shop. With the promotion of online stores, consumers can find out which products are sold at the store. Consumers who are looking for a product can search based on various attributes of goods that are scattered in various fields in the database table, and can even be spread across different tables. All attributes that point to an item are collected in one document which will be searched using the Full Text Search system. Two alternatives to the Full Text Search system were selected; Lucene.Net and Sqlite Full Text Search. Before actually being used, these two search system alternatives were tested first. In document storage size, Lucene.Net is superior by 6.78 times. The speed of writing Sqlite search documents is superior by between 1,875 times to 5,197 times. In terms of key search speed, Lucene.Net was superior by between 1,169 and 1,698 times. Based on the consideration of the speed and development of Lucene.Net Core which is still in beta stage, Sqlite Full Text Search is suitable for use in the product search process in the Online Store.
Implementasi Metode Forward Chaining dalam Mengidentifikasi Kepribadian Siswa Raju Wandira; Jufriadif Naam
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2236

Abstract

Personality is the overall psychological and physical aspects of an individual reacting and interacting with other individuals. Personality is a prominent and often shown thing that exists in an individual. Students have different personalities, and that will affect the quality of learning. To be able to improve the quality of learning, schools need to identify and understand the personality of their students. So that appropriate learning methods can be applied and the selection of appropriate majors in tertiary institutions. To identify student personality can be done with a system called the expert system. The expert system identifies student personalities using the forward chaining method obtained from State High School 1 Candung students (SMAN 1 Candung), Agam Regency. In the forward chaining method, the reasoning process starts from the facts first to test the truth of the hypothesis. The process of finding the data starts from the premises to the final conclusion. Creating an expert system for identifying student personalities using the PHP Programming Language and MySQL Database. The result of testing this method is knowing the personality of students so that appropriate learning methods can be applied, majors recommendations and advice on the type of work according to the personality of the student. Personality expert system has been able to identify the personality of students in determining learning methods and choosing majors as well as suggestions for the type of work. Personality expert systems have been able to identify student personalities in determining learning methods and selection of majors as well as suggestions for types of work. This expert system is already running well and can be recommended to help students, teachers and schools in improving the quality of learning in schools

Page 1 of 1 | Total Record : 8